Although it’s impossible to protect against every eventuality, here are a few safeguards that can be implemented.
ALWAYS
- Review beneficiary details of payment before you approve transactions, especially those with new or changed information
- Check account activity on a regular basis for any suspicious transactions
- Set up customized automatic accounts alerts to know when certain activities take place
- Set payment limits at account and employee levels based on payment trends and history
- Verify whom you’re communicating with and know what information can be shared
- Stop any online session that makes you uncomfortable
- Avoid email usage for confidential or sensitive information
- Create and update strong passwords (We recommend LastPass for this!)
- Log off inactive devices and lock your workstation when you’re away
- Minimize personal web-surfing on your business devices
- Use protected Wi-Fi networks that you trust
- Make sure your systems are protected by current and effective anti-virus software
NEVER
- Respond to payment instructions received by email or phone without first validating the instructions by telephone or in person
- Open an email, click a link in an email or open an email attachment without first validating the source
- Share confidential information, including log-in credentials and account numbers
- Respond to pop-ups or unsolicited phone calls asking you to re-submit your log-in information or that of another user
- Allow co-workers to log-in to your machine or use your log-in credentials
- Send work information to personal email accounts
- Enter personal information in an email or text message
- Describe your job on personal social media accounts
CYBER SECURITY & CYBER FRAUD: TIPS TO HELP PROTECT YOUR ASSETS
Small businesses can reduce the risk of losses due to cyber fraud by understanding these most common methods cyber criminals use:
SOCIAL ENGINEERING
Interactions with a cybercriminal such as a phone call, email or conversation that trick a user into sharing sensitive information.
PHISHING
A cybercriminal contacts a user by email or phone and obtains the user’s security credentials, permitting the cybercriminal to act on behalf of the user.
There are 3 ways you can engage with us:
1. Watch our Free training on how to streamline & automate your coaching business to run like a well-oiled machine at any scale (even if you hate tinkering with technology)
2. Download a Free copy of the Tech Toolkit used by high-ticket coaches to scale their business fast.
3. Book a Smartify Session. We’ll go through a game-plan that takes your business processes from clunky and disjointed to a well-oiled machine that enables you to scale to your 7 figure dreams.
Click here to Book a Smartify Session
More Tips You'll Like
Best Online Tool To Improve Your Writing
Using Grammarly To Improve Your Writing In the digital world, it’s really important to make your online writing clear and effective. This means no spelling errors, grammar mistakes and...
Find Out Where You’re Spending The Most Time In Your Business
How Are You Spending Time In Your Business? When you’re trying to scale a business, it’s important to know what activities you’re spending your time on. Time tracking allows you to make more...
How To Use Google Calendar To Plan Better Meetings
Create better meetings in Google Calendar I was listening to a podcast about how to make meetings NOT suck (it’s one from Freakanomics). One of the ways is to have an agenda and clear...
Lindsey is an Ontraport Certified Consultant and founder of Smartify My Biz. She’s a digital strategist devoted to transforming and streamlining businesses using marketing and sales automation. Her goal? More profit for your pocket plus a business that runs like a well-oiled machine.